CN101441689A - Login protection method - Google Patents

Login protection method Download PDF

Info

Publication number
CN101441689A
CN101441689A CNA2007101967375A CN200710196737A CN101441689A CN 101441689 A CN101441689 A CN 101441689A CN A2007101967375 A CNA2007101967375 A CN A2007101967375A CN 200710196737 A CN200710196737 A CN 200710196737A CN 101441689 A CN101441689 A CN 101441689A
Authority
CN
China
Prior art keywords
log
hook
message
user
window
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007101967375A
Other languages
Chinese (zh)
Inventor
杨筑平
周跃平
杨霄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA2007101967375A priority Critical patent/CN101441689A/en
Publication of CN101441689A publication Critical patent/CN101441689A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a log-in protection method, which relates to the technical field of computer software, software communication and information security. at the outside of an object log-in interface, an agent is used to acquire user log-in information, at least password item in user log-in information is subjected to encryption conversion; when the actual operation of the user directs to the position of a subwindow to be sent on the object log-in interface, and user log-in information is sent to the object log-in interface by the window information span thread; the method actively and dynamically controls and installs a defense hook program for the window attribution thread; due to competition, the window attribution thread is positioned on the chain head of the hook and is privileged to be called for execution, the defense hook program is directly returned to shield the following hooks in the end so as to avoid the malicious interception of information related to window process. The method realizes the concurrent operation of common software products, network service systems and agent independent from the object application program, is widely applied to E-mail boxes, network banks, business affairs, government affairs, communication, game and information systems with required user log-in, and can effectively protect user accounts from embezzlement.

Description

Login protection method
Technical field
The present invention relates to computer software, network service and field of information security technology.
Background technology
Login is the only way that the user entered and used application system.On login interface, the user imports log-on message (mainly be account information, comprise user name/account number, password, also have the supplementary of identifying code and so on), accepts system after confirming and veritifies.In network environment, especially on the internet, panoramic spy's program (refers to steal the program of user profile, as trojan horse program etc.) walk crosswise and wreak havoc, but very latent close being difficult to found, steals account information unconsciously through the user that is everlasting, infringement privacy of user and property.The big public hazards that this has become a networked society greatly jeopardize the normal order of various application such as E-mail, Web bank, ecommerce, E-Government, instant messaging, online game.
Spy's program is stolen the account information of user's login, mainly contains three kinds of means: the one, and eavesdropping keyboard, record button and mouse action information; The 2nd, peep screen, intercepting window interface image; The 3rd, interception message is obtained the window input information.The various countermeasure and the solution of prior art also continue to bring out.The way of " based on the computer information safe input method of graphic keyboard " (Chinese invention patent application number 200410050950.1) and " content input method and system thereof " (Chinese invention patent application number 200710109498.5) is, present the graphic keyboard interface, mouse is imported click location be converted to the character input.Such method has been avoided eavesdropping keyboard record button, but hides from and only peeps screen.Spy's program has both write down the click position as long as preceding two kinds of means are used in combination, and intercepts the keyboard figure again, just can effectively crack the character information that reproduces input.The way of " dynamic identifying method " (Chinese invention patent application number 200510025109.1) is, by the user preset rule change, authenticates by mutual question and answer at random, gives to peep and makes difficulty.This method is more loaded down with trivial details and still can not effectively hide spy's program.The way of (Chinese invention patent application number 200610105978.X) is " to be used to prevent the method and the device of illegal programm from scavenging ", according to the judgement of process behavior to determine whether intercepting system calls, for asking effective operating system nucleus that needs to touch.This method more complicated will accomplish accurately to judge that actual meeting is very difficult, and if touch the anxiety that system kernel also has stability, in addition the parameter that also has operating system version to upgrade.It thinks that it is fully that interception transmission WM_GETTEXT message is stolen text message to prevention, is not enough in fact; And, can't solve eavesdropping keyboard and the secret worry of peeping screen.In sum, existing technical method for preventing that user's account information is stolen in the login process, all also has certain limitation.
Summary of the invention
The login protection method that the present invention proposes, its purpose and purposes are that protection user's account information exempts to be deliberated to usurp by other people in login process.
The present invention at first starts with from hook protection this respect, and its basic ideas are initiatively hook chains of the ownership thread of control login window of oneself, and the defence hook is cut off the running way of spy's hook that program is installed by bad thread malicious exploitation.
The operating system based on the graphical window interface of current main flow (as the Windows series operating system of Microsoft) is all by message-driven.A plurality of tasks or application program can be on macroscopic view concurrent running, each task is dispatched as a management of process, and each process is made up of a main thread and several (also can not having) sub-threads.Thread is the elementary cell of traffic control, and input queue and the message queue of oneself arranged.All windows all are by the thread creation of correspondence, and the thread that the present invention will create certain window is called the ownership thread of this window.All windows all are subordinated to set separately window class, and corresponding window procedure is also just arranged.Input in the input queue (pressing, upspringing, actions such as mouse moving, click as keyboard key) all will be converted into message and be delivered to window procedure, and words are presented on the window more as can be seen then.A key mechanism of operating system is to allow for thread hook (Hook) is installed, and makes the hook program code can insert the implementation of thread and has an opportunity operation.Hook is divided into polytype, and by the chain type organization and administration, the host and the quantity of various types of hooks are not limit.Operating system (was decided according to the type of hook) before or after calling window procedure with window message, also window message was passed to the hook program and was called execution, so the hook program just can be obtained window message easily, thereby also obtained the window input.The hook mechanism of operating system, both the tracking of application programs, debugging and monitoring were provided convenience, and had also given the program of having an ulterior motive with opportunity simultaneously.In fact, the brilliant gimmick that some spy's programs are taked, utilized this hook mechanism as the back door just, the code of the larceny that carries out is inserted the ownership thread of window (for example user's login interface window) snugly as the hook program, and user profile (for example log-on message) is obtained in premeditated interception.The present invention's countermeasure in this respect is that defensive hook initiatively is installed, and restrains the hook of malice.The hook administrative mechanism of operating system wherein has two key links: the one, always call the hook program of head node on the hook chain; The 2nd, depend on explicit the calling of hook program and execution is turned to the hook program of subsequent node.The present invention makes full use of at these 2 and makes up the hook preventing mechanism.At first, head node on the hook chain is considered as lofty perch, implement the installation of dynamic preemptive formula, try hard to make defensive hook become the hook of up-to-date installation by competition, promptly be in the head node position on the similar hook chain, preferentially call the chance of execution with being operated system thereby defensive hook program is won.Secondly, defensive hook program made painstakingly arrange, allow it directly return and no longer call other hook programs of subsequent node on the hook chain.Defensive hook program need be empty call back function only usually, and it need not be done except returning whatever; Although can also arrange to bear some other additional functions (as character encryption, message feedback etc.), but its ultimate processing then is directly to return, making that other hook programs of subsequent node lose on the hook chain activates the chance of carrying out, thereby reaches other hook programs of the shielding effect and the purpose of (comprising the hook program that spy's program is installed).Whether have spinoff as for other hook programs of shielding; the inventive method is inferred from the simple property of logging program function and the angle of protection necessity; if the ownership thread of login interface window has been mounted other hooks; these hooks are not unnecessary being not good at so, shield them and are unlikely to cause the disappearance of window function (being that the user logins) with unusual yet.Though defensive hook program can not avoid spy's program that hook is installed, and relies on the safeguard of seizing preferentially and directly returning, chance is carried out in activation ingenious and that deprived spy's program hook reliably.In order to realize the installation of dynamic preemptive formula, the assurance on opportunity, can arrange by window events (as create, active, size change etc.) and incident (as focal variation, text change, the click etc.) message-driven of control (being subwindow) and respond installation.The generation of the event message of window and control thereof has randomness, is dynamic as the response of message being implemented install.Such as, for user's login interface window, input edit box control (being subwindow) acquisition focus whenever sensitive information item (as user name, password), or the button (also being subwindow) of confirming login is clicked, and when producing corresponding window events message, then responded the once defensive hook of instant installation.Since be the installation of dynamic preemptive formula, not that disposable successful installation is got over just, but tend to keep competition situation that one-step installation when scheduled event takes place, is promptly implemented in pulsating ground, repeatedly.Timer can also be set, periodically repeat to install defensive hook.Installation each time all will unload old hook (except first the installation) earlier new hook is installed again, and install used repeatedly is that same hook program (can be the local code in this thread code territory, or the global code that loads from the dynamic base dll file), can not cause the accumulation of hook quantity to increase progressively.So pulsating ground, unloading is installed again repeatedly, is the available strategy with spy's program competition hook right of priority, feasiblely allows defensive hook seize and remain on that head node becomes possibility on the hook chain.Logging program is initiatively installed defensive hook for the window attribution thread of oneself, especially pays attention to the dynamic preemptive formula and installs, and just can reach the good efficacy of self-protection.
The present invention's thinking on the other hand is to collect and encrypt and change by the agency, transmits log-on message snugly.
The basic mode of user's login is directly by keyboard input log-on message.Spy's program only need periodically be watched input queue, or the monitoring keyboard state, just can write down the log-on message of stealing user's input.The present invention designs the employing Agent, presents an alternative inputting interface and imports log-on message for the user.The login interface of the intended application system that the user will login originally, the present invention is referred to as the target login interface.The inputting interface of Agent and target login interface can references, and the former item of information input control has at least part corresponding with the latter's item of information input control, and relative such as the user name item, cryptographic item is relative, and the type of control is same or similar; But also need not require both item of information input controls corresponding fully, special situation is that the inputting interface of Agent has only an item of information (for example password) input control.Agent is being collected log-on message, and through after user's affirmation, crosses over thread by the window message transfer mode again and send to the target login interface.In operating system, can transmit the message to another window from a window, two kinds of load modes are specifically arranged: first kind is to send (Send), and message is considered as non-formation message, bypass message formation and directly call window procedure, and wait for that it is finished and just return; Second kind is to send (Post), only simply message is sent into message queue and just return immediately, and the message circulation of the thread of leaving is gone to finish follow-up extraction, analyzes message and is called window procedure.The said transmission of the present invention broadly comprises this two kinds of load modes.Because at the multitask running environment, Agent and intended application system (or target logging program), even also with other program concurrent runnings, so Agent is difficult to determine voluntarily target login interface window, more be difficult to definite concrete subwindow position wherein.So agreement, by the user after confirming log-on message, the position of the concrete subwindow of whereabouts to be sent on the practical operation definite object login interface again.Action is pointed in user's practical operation, and multiple mode can be arranged.Click after simply putting in place as rolling mouse; Loaded down with trivial details then travels the carriage return affirmation of back, location with function Macintosh switch window and tab key.With input pen click, the screen finger touch, can treat as click.Agent judges that the user has finished practical operation and pointed to, and dual mode is arranged: the one, to the detection senses of user's operational motion, press as click, keyboard enter key; The 2nd, regularly agreement when predetermined amount of time (as 2 seconds) passes, concludes that then the user has finished the practical operation sensing during this period.After user's practical operation on the target login interface was pointed to, operating system made target login interface window become the current window that enlivens, and the concrete subwindow position at cursor (focus) place also can be distinguished.Agent can be made this and be judged accurately and obtain window pointer (Handle), and this subwindow position pointed is the concrete subwindow position of whereabouts to be sent on the target login interface just.Especially, Agent perhaps at the latest before log-on message is sent to the target login interface, had been implemented enciphering transformation to log-on message (wherein comprising cryptographic item at least) before log-on message is sent.So, become nominal log-on message from the log-on message of Agent interface input, and be only the actual log information that is used for the target login interface through the log-on message behind the enciphering transformation.Even spy's program has been stolen nominal log-on message by ways such as monitoring keyboards, but is not actual log information, can not directly effectively login at the target login interface.So, just reached and allowed the protection effect of the hidden login of user.
Yet because Agent is open issue, the thief also has an opportunity to use same Agent to login with the nominal log-on message of stealing, and will cause hidden login protection to be lost efficacy.For addressing this problem own independently a whole set of authentication system of Agent.All users of Agent have the authentication account of oneself, promptly use account's (comprising account number, password), and this is the basis of authentication management.Agent is also gathered and this machine characteristic of registered user's terminal when user registration or change automatically, can be selectively, and the input feature vector data of collection and registered user's terminal also.Described machine characteristic, be meant hardware configuration parameter (as cpu type and sequence number, network adapter physical address, memory size, hard-disk capacity etc.), software environment parameter (as the version number of operating system, Database Systems, sequence number, installed date etc.) and the stored parameter (as configuration file critical data item, crucial identification file, the storage location of specific file on hard disk etc.) of terminal, the data acquisition that is enough to distinguish the apparatus characteristic of different terminals like that.Described input feature vector data are meant the data of the device input that is connected from exterior of terminal by the user, as the coded data of preserving on IC-card, magnetic card, the USB interface storer, and biological attribute datas such as fingerprint, palmmprint, iris, or the like.Agent is used in when login the user, except the authentication verification account, also with this machine characteristic and/or the input feature vector data of verification terminal.If the thief has stolen nominal log-on message, also use same Agent to login, but it is difficult to this machine characteristic that legal registered user's terminal is duplicated in strange land (on different terminals), and the step of this machine of Agent verification terminal characteristic will be doomed its illegal login failure; The personation login can not be submitted effective input feature vector data to because of it again even the thief has an opportunity on same station terminal, and the step of Agent verification terminal input feature vector data also will be doomed its illegal login failure.A kind of simplification of above-mentioned authentication system realizes, is to ignore all registrations and verification step, and reading terminals input feature vector only is used as the key of log-on message being implemented enciphering transformation.But for the consideration in easy-to-use, efficiency of service and security and even the operation, can at least one certificate server of networked deployment, and with the registration and the verification step of above-mentioned authentication system, implement via this certificate server.
The log-on message of collecting when the program of acting on behalf of includes multinomial information (if any user name, password, identifying code), want after the user confirms can disposablely send on the corresponding informance item of target login interface, prerequisite is these items of information at order on the Agent inputting interface and sequence consensus on the target login interface.Agent is actually in order item of information transmission one by one: send after the item of information, control moving cursor (being focus) sends next item of information again to next position; So circulation finishes until the transmission of full detail item.Therefore, be the initial term position of log-on message by the concrete subwindow position of user's practical operation definite object login interface, sensing is then controlled in regular turn by Agent in the subsequent item position of log-on message.Agent sends after the log-on message in regular turn, can also control subsequent item location positioning on the target login interface is used to confirm button or the other types control logined, move by simulating keyboard carriage return button or click subsequently, and the login behavior of triggering on the target login interface.
In order to realize enciphering transformation, can select various cryptographic algorithm or key for use from nominal log-on message to actual log information.And in order to strengthen the effect of encryption, the algorithm of enciphering transformation can be determined and the key selection, be associated with this machine characteristic and/or the outside input feature vector data of terminal.Under the networking condition, can also come to realize used algorithm or required key is provided by the certificate server of online layout for enciphering transformation.
When Agent was about to send log-on message to target login interface window, spy's program may have been installed hook program preparation interception and obtained.Defence measure as this situation, Agent is after user's practical operation is pointed to, the ownership thread that is subwindow pointed is installed defensive hook program, shields the similar hook program of formerly being installed by other threads (thread that comprises spy's program) before this with this.Then, Agent just sends log-on message safely.Agent also can be considered as a kind of special logging program, can defensive hook program initiatively be installed for own fully, and self-protection is not harassed by the malice hook program of spy's program.
Login protection method of the present invention has versatility, can be implemented as software product and online service system.Described Agent is independent of destination application and concurrent running can generally be applicable to E-mail, Web bank, ecommerce, E-Government, instant messaging, online game, and the occasion logined of the every user of needs of various management information system.
Description of drawings
Fig. 1 is the synoptic diagram of login protection method of the present invention.Terminal user (10) uses Agent (20) input log-on message (11); Agent (20) is gathered this machine characteristic (21) after the log-on message (11) of collecting is identified, and/or gathers input feature vector data (22), sends authentication request (24) to certificate server (30) then; The authentication request (24) of certificate server (30) to receiving, comparison is the log-on message of registration before this, verification terminal user's account information, and this machine of verification terminal characteristic and/or input feature vector data, beam back authentication result (31) then, the information that wherein comprises relevant cryptographic algorithm or key, or through encrypting the log-on message item of conversion; Agent (20) is received authentication result (31) afterwards, if determine authentication effectively, then encrypts the log-on message (11) that conversion has been collected, perhaps just takes the log-on message of encrypting conversion of passback, waits for the arrival of pointing to feedback (23); Terminal user (10) is confirming log-on message (11) afterwards, and the initial term subwindow (51) on (12) target login interface window (50) is pointed in practical operation again, and system will send thus and point to feedback (23); Agent (20) is obtaining to point to feedback (23) afterwards, carry out immediately hook (25) action (dotted line signal) is installed, make defensive hook program (40) can seize hook begin chain (41) position (dotted line signal), and then, to encrypt the log-on message after changing, send to target login interface window (50) as log messages (26).
Fig. 2 is in the login protection method of the present invention, the process flow diagram of Agent in login process process.After preparation (1) is ready, collect log-on message (2), extract characteristic (3); Carry out authentication (4) process, judge (5) authentication result, if invalid (N) then turns to ends (10), if effective (Y) encrypted login information (6) then; Judge that the user points to (7), then continues circulation and wait judgement, defensive hook (8) then is installed as if pointing to (Y) if point to (N); Be to send log messages (9) at last, and end (10).
Embodiment
Target setting running environment is the Windows operating system of Microsoft, uses Visual Studio.Net integrating and developing platform.
One, the embodiment of hook protection.
Develop MFC dynamic link library (DLL) project of a Visual C++ class type, only set up a sky call back function LRESULT CALLBACK RecoveryCallWndProc (int nCode, WPARAM wParam, LPARAM lParam)
//return?CallNextHookEx();
return?NULL;
}
As defensive hook program, code is wherein just carried out and is returned 0 value, does not return api function and calls CallNextHookEx () and do not carry out, and has intentionally deprived the operation chance of follow-up hook.This DLL project compiling generates the recovery.dll file.At the logging program of required protection, obtain its window pointer hWnd, call the sign that its ownership thread was obtained and preserved to api function again
dwWinThreadID=GetWindowThreadProcessId(hWnd,NULL);
Periodically monitor its window,, then carry out similar following code segment so that defensive hook program HOOKPROC hkprcRecovery to be installed whenever it becomes currently when enlivening window;
static?HINSTANCE?hinstDLL;
Static HHOOK hhookRecovery=null; // only initialization is once
hinstDLL=LoadLibrary((LPCTSTR)″recovery.dll″);
hkprcRecovery=(HOOKPROC)GetProcAddress(hinstDLL,″RecoveryCallWndProc″);
if(hhookRecovery!=null)
UnhookWindowsHookEx(hhookRecovery);
hhookRecovery=SetWindowsHookEx(idHook,hkprcRecovery,hinstDLL,dwWinThreadID);
Wherein, idHook is hook type (as WH_CALLWNDPROC, WH_CALLWNDPROCRET, WH_KEYBOARD, etc.).For asking insurance, to all hook types (known existing 15 kinds), as above carry out the defensive hook program of installing respectively successively.Set a timer again, enliven run duration, just repeat defensive hook program so to be installed, promptly realize the installation of dynamic preemptive formula into it every 2 seconds at destination application.
Two, the embodiment of login protection method.
Create a solution, comprise the Windows project of 5 Visual C++ class types: 1 MFC dynamic link library (DLL) project, described similar with the embodiment of front hook protection, as defensive hook program is installed; 2 MFC application item are respectively as Agent (client) and authentication procedure (service end); 2 deploying projects is installed, is respectively Agent (comprising DLL project master output) and authentication procedure compiling and generates installation kit.
Agent runs on user terminal.The interface of designing program comprises three property pages: [login], [authentication], [setting].[login] is defaulted as first property pages, wherein arranges 3 text edit box controls, and called after user name, password, identifying code all dispose a check box so that select combination before every name respectively, also arrange [affirmation] button in addition.The user is after selecting and importing log-on message, click [affirmation] button, Agent just responds, collect log-on message, the physical address numbering of extracting network interface card together with cryptographic item and authentication account information, is packaged as the authentication request bag as this machine characteristic, set up the TCP/IP connection and be sent to certificate server, and after receiving authentication result, remove the TCP/IP connection.Authentication result is if effectively, then wherein comprise the cryptographic item of beaming back of having encrypted, and recycle is carried out api function and detected keyboard state
SHORT?state=GetAsyncKeyState(VK_LBUTTON);
Until the corresponding left mouse button mode bit set of state value by the time, be that user's practical operation is clicked the mouse and pointed to the position of concrete subwindow in the target login interface window, then obtain its window pointer hWnd, by the embodiment of aforementioned hook protection, defensive hook program is installed then.And then, to each log-on message item, promptly user name, password, identifying code (if user's final election) call api function in regular turn respectively and send
SendMessage(hWnd,WM_SETTEXT,(WPARAM)0,(LPARAM)strItem);
Wherein, hWnd is the pointer of specifying information item subwindow in the target login interface window, and strItem is the pointer of the log-on message item character string that will send.Whenever, send an item of information, just called tab key of api function simulation
keybd_event(VK_TAB,0,0,0);
Can transfer to next item of information subwindow by controlling cursor.So repeat, finish until whole log-on message items transmissions, the focus on the target login interface window may be shifted on the button of confirming login, calls api function simulation enter key this moment again
keybd_event(VK_RETURN,0,0,0);
Will trigger the login behavior on the target login interface.
[authentication] is second property pages, wherein arranges 4 text edit box controls, and called after authentication code, authentication password, affirmation password, input key (input feature vector data) are also arranged [affirmation] button in addition respectively.The authentication account who is used for leading subscriber.
[setting] is the 3rd property pages, arranges some controls, is used to dispose correlation parameter, as port, communication mode, speed, data layout etc.
Authentication procedure runs on server end.Its major function is that the TCP/IP that in time accepts user terminal requests on the net connects, and finishes registration and checking to authentication account and characteristic, and passback checking result.Especially, also bear the user login code item is carried out enciphering transformation, cryptographic algorithm adopts MD5 hashing algorithm and presses the Password Length intercepting.

Claims (10)

1; a kind of login protection method; be for the ownership thread of the login window of oneself defensive hook program to be installed initiatively by logging program; the similar hook program that is used for stoping other threads to be installed is intercepted and captured the window procedure related news; it is characterized in that: it is that the dynamic preemptive formula is installed that described active is installed; tend to compete the hook that becomes up-to-date installation; make described defensive hook program be in head node on the similar hook chain and will preferentially be called execution by system; the ultimate processing of described defensive hook program then is directly to return and never call other hook programs of subsequent node on the hook chain, thereby reaches the effect purpose of other hook programs of shielding.
2, method according to claim 1 is characterized in that, described dynamic preemptive formula installation, and by window and control event-driven or timer event driving, summary responses are implemented to install, and the strategy of competition then is that pulsating ground unloads installation more repeatedly.
3; a kind of login protection method; be outside the target login interface; the alternative inputting interface that presents reference with it with another Agent; collect user's log-on message; cross over thread by the window message transfer mode then and send to the target login interface; it is characterized in that: after the user confirms log-on message; described Agent is also waited for the concrete subwindow position of whereabouts to be sent on user's practical operation definite object login interface; and described Agent is implemented enciphering transformation to cryptographic item wherein at least before log-on message is sent out or before log-on message is sent to the target login interface.
4, method according to claim 3, it is characterized in that, the also self-contained independent authentication system of described Agent comprises the step of collection, registration, this machine of verification terminal characteristic, and/or the step of collection, registration, the outside input feature vector data of verification terminal.
5, method according to claim 4 is characterized in that, the registration of described authentication system and verification step are implemented via the certificate server of networked deployment.
6, method according to claim 3 is characterized in that, the described concrete subwindow position of being pointed to by user's practical operation is the initial term position of log-on message, and sensing is then controlled in regular turn by described Agent in the subsequent item position of log-on message.
7, method according to claim 6, it is characterized in that, described subsequent item position is controlled of being positioned on the target login interface and is used to confirm button or the other types control logined, described Agent is subsequently by simulating keyboard carriage return button or click action, and the login behavior of triggering on the target login interface.
8, method according to claim 3 is characterized in that, algorithm that described enciphering transformation adopted or key are associated with this machine characteristic and/or the outside input feature vector data of terminal.
9, method according to claim 3 is characterized in that, algorithm that described enciphering transformation adopted or key are realized and provided via the certificate server of networked deployment.
10, method according to claim 3, it is characterized in that, described user's practical operation is pointed to, and also causing described Agent is that the ownership thread of subwindow pointed is installed defensive hook program, shields the similar hook program of formerly being installed by other threads before this with this.
CNA2007101967375A 2007-11-23 2007-11-23 Login protection method Pending CN101441689A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007101967375A CN101441689A (en) 2007-11-23 2007-11-23 Login protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007101967375A CN101441689A (en) 2007-11-23 2007-11-23 Login protection method

Publications (1)

Publication Number Publication Date
CN101441689A true CN101441689A (en) 2009-05-27

Family

ID=40726122

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007101967375A Pending CN101441689A (en) 2007-11-23 2007-11-23 Login protection method

Country Status (1)

Country Link
CN (1) CN101441689A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101980160A (en) * 2010-10-28 2011-02-23 北京飞天诚信科技有限公司 Implementing method for encrypted .NET program
CN102393894A (en) * 2011-09-30 2012-03-28 飞天诚信科技股份有限公司 Method and device for enhancing user information input security
CN104123177A (en) * 2014-07-18 2014-10-29 无锡梵天信息技术股份有限公司 Lockless multithreading data synchronization method
CN104426834A (en) * 2013-08-19 2015-03-18 腾讯科技(深圳)有限公司 Webpage requesting method, client, server and system
CN104468600A (en) * 2014-12-18 2015-03-25 北京奇虎科技有限公司 Data collection method and client-side
CN105069351A (en) * 2015-07-23 2015-11-18 浪潮电子信息产业股份有限公司 Apparatus and method for preventing stealing of login information of application program
US9270670B1 (en) 2014-10-10 2016-02-23 Joseph Fitzgerald Systems and methods for providing a covert password manager
CN106230842A (en) * 2016-08-05 2016-12-14 张家口乐淘商贸有限公司 A kind of data processing method of ecommerce government system
CN107302539A (en) * 2014-09-01 2017-10-27 刘文印 Method and its system that a kind of electronic identity registration and certification are logged in
CN107770117A (en) * 2016-08-15 2018-03-06 台山市金讯互联网络科技有限公司 A kind of safe network access control method
CN108021830A (en) * 2014-03-26 2018-05-11 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN109194683A (en) * 2018-09-30 2019-01-11 北京金山云网络技术有限公司 Logon information processing method, device and client
CN110704566A (en) * 2019-09-30 2020-01-17 深圳前海环融联易信息科技服务有限公司 Data acquisition method and device based on geographic position and computer equipment

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101980160B (en) * 2010-10-28 2013-02-13 飞天诚信科技股份有限公司 Implementing method for encrypted .NET program
CN101980160A (en) * 2010-10-28 2011-02-23 北京飞天诚信科技有限公司 Implementing method for encrypted .NET program
CN102393894A (en) * 2011-09-30 2012-03-28 飞天诚信科技股份有限公司 Method and device for enhancing user information input security
CN102393894B (en) * 2011-09-30 2015-07-22 飞天诚信科技股份有限公司 Method and device for enhancing user information input security
CN104426834A (en) * 2013-08-19 2015-03-18 腾讯科技(深圳)有限公司 Webpage requesting method, client, server and system
CN108021830B (en) * 2014-03-26 2022-03-18 联想(北京)有限公司 Information processing method and electronic equipment
CN108021830A (en) * 2014-03-26 2018-05-11 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN104123177A (en) * 2014-07-18 2014-10-29 无锡梵天信息技术股份有限公司 Lockless multithreading data synchronization method
CN104123177B (en) * 2014-07-18 2019-01-08 无锡梵天信息技术股份有限公司 A kind of multithreaded data synchronization method of no lock
CN107302539B (en) * 2014-09-01 2021-04-13 登录易(深圳)科技有限公司 Electronic identity registration and authentication login method and system
CN107302539A (en) * 2014-09-01 2017-10-27 刘文印 Method and its system that a kind of electronic identity registration and certification are logged in
US9270670B1 (en) 2014-10-10 2016-02-23 Joseph Fitzgerald Systems and methods for providing a covert password manager
US9571487B2 (en) 2014-10-10 2017-02-14 Joseph Fitzgerald Systems and methods for providing a covert password manager
CN104468600A (en) * 2014-12-18 2015-03-25 北京奇虎科技有限公司 Data collection method and client-side
CN105069351A (en) * 2015-07-23 2015-11-18 浪潮电子信息产业股份有限公司 Apparatus and method for preventing stealing of login information of application program
CN106230842A (en) * 2016-08-05 2016-12-14 张家口乐淘商贸有限公司 A kind of data processing method of ecommerce government system
CN107770117A (en) * 2016-08-15 2018-03-06 台山市金讯互联网络科技有限公司 A kind of safe network access control method
CN109194683A (en) * 2018-09-30 2019-01-11 北京金山云网络技术有限公司 Logon information processing method, device and client
CN110704566A (en) * 2019-09-30 2020-01-17 深圳前海环融联易信息科技服务有限公司 Data acquisition method and device based on geographic position and computer equipment
CN110704566B (en) * 2019-09-30 2022-05-13 深圳前海环融联易信息科技服务有限公司 Data acquisition method and device based on geographic position and computer equipment

Similar Documents

Publication Publication Date Title
CN101441689A (en) Login protection method
Yuan et al. Shadoweth: Private smart contract on public blockchain
US9798879B2 (en) Apparatus, system, and method for protecting against keylogging malware
US8261359B2 (en) Systems and methods for preventing unauthorized use of digital content
US8316445B2 (en) System and method for protecting against malware utilizing key loggers
US9584543B2 (en) Method and system for web integrity validator
US9396331B2 (en) Systems and methods for security management based on cursor events
CN102110198B (en) Anti-counterfeiting method for web page
CN101483658B (en) System and method for input content protection of browser
CN101816148A (en) Be used to verify, data transmit and the system and method for protection against phishing
Li et al. Vbutton: Practical attestation of user-driven operations in mobile apps
CN104246698A (en) Computer with flexible operating system
CN103038775A (en) Electronic license management
CN102195940A (en) Virtual-machine-technology-based data security input and submission method and system
Garay et al. Software integrity protection using timed executable agents
Jeon et al. TZMon: Improving mobile game security with ARM trustzone
DeMara et al. Mitigation of network tampering using dynamic dispatch of mobile agents
Welch et al. Architectural Analysis of MAFTIA's Intrusion Tolerance Capabilities
CA2691129A1 (en) Activex object method and computer program system for protecting against crimeware key stroke loggers
AU2002219852B2 (en) Systems and methods for preventing unauthorized use of digital content
AU2002219852A1 (en) Systems and methods for preventing unauthorized use of digital content
Erasmus Anatomy of a malware attack
Shuang Using Context to Verify User Intentions
Sabu et al. Advanced Keylogger with Keystroke Dynamics
EP1637959A2 (en) Systems and methods for preventing unauthorized use of digital content

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20090527